Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt

Mark Andrews <marka@isc.org> Sat, 20 October 2018 22:27 UTC

Return-Path: <marka@isc.org>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FE10130DEB for <ipv6@ietfa.amsl.com>; Sat, 20 Oct 2018 15:27:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2AGs8PKWl2o1 for <ipv6@ietfa.amsl.com>; Sat, 20 Oct 2018 15:27:13 -0700 (PDT)
Received: from mx.pao1.isc.org (mx.pao1.isc.org [IPv6:2001:4f8:0:2::2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4CEAE1286D9 for <ipv6@ietf.org>; Sat, 20 Oct 2018 15:27:13 -0700 (PDT)
Received: from zmx1.isc.org (zmx1.isc.org [149.20.0.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.pao1.isc.org (Postfix) with ESMTPS id 2CA893AB03B; Sat, 20 Oct 2018 22:27:13 +0000 (UTC)
Received: from zmx1.isc.org (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTPS id D59D5160046; Sat, 20 Oct 2018 22:27:11 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by zmx1.isc.org (Postfix) with ESMTP id C6590160071; Sat, 20 Oct 2018 22:27:11 +0000 (UTC)
Received: from zmx1.isc.org ([127.0.0.1]) by localhost (zmx1.isc.org [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id BAhWTV5K858i; Sat, 20 Oct 2018 22:27:11 +0000 (UTC)
Received: from [10.88.10.147] (unknown [103.14.185.15]) by zmx1.isc.org (Postfix) with ESMTPSA id 8F9D7160046; Sat, 20 Oct 2018 22:27:09 +0000 (UTC)
Content-Type: multipart/alternative; boundary="Apple-Mail-3C05A551-3C16-473D-9A2C-D5E4ED071E1E"
Mime-Version: 1.0 (1.0)
Subject: Re: I-D Action: draft-ietf-6man-ipv6only-flag-03.txt
From: Mark Andrews <marka@isc.org>
X-Mailer: iPhone Mail (16A366)
In-Reply-To: <fbeb28dd-5e05-1883-e0b5-78ac6634181b@asgard.org>
Date: Sun, 21 Oct 2018 06:27:05 +0800
Cc: ipv6@ietf.org
Content-Transfer-Encoding: 7bit
Message-Id: <98BC0612-9798-4382-8FAE-8F202BEF1AF2@isc.org>
References: <153973137181.9473.10666616544238076833@ietfa.amsl.com> <092346e1-6350-e54e-e711-9c5ee6dc4e6b@gmail.com> <CAFU7BASO_ByzbanhLKnWV280O_fASd-8W+ujpj3sN6d2-whw2w@mail.gmail.com> <CACWOCC-u7aAPwAOcixYvt2On=-o_8X25GhqdXTfA+tWRC1o2XA@mail.gmail.com> <fbeb28dd-5e05-1883-e0b5-78ac6634181b@asgard.org>
To: Lee Howard <lee@asgard.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/pVKLhYQZ_u0gCmbvu94WMK_gJ4Q>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 20 Oct 2018 22:27:15 -0000

Then you as the administrator would not set the flag. It is a straw man to make such arguments.

BYO networks and home networks need this flag.  I really don’t want to have to figure out how to disable IPv4 in every device in the home network once I get to the stage that every device I care about supports IPv6.  Lots of extra noise for zero benefit. 

-- 
Mark Andrews

> On 20 Oct 2018, at 23:37, Lee Howard <lee@asgard.org> wrote:
> 
> I've been meaning to say the same thing. I don't think there's astronger advocate for IPv6-only than I am, but I have some misgivings on this document that I haven't quite been able to articulate.
> 
> I haven't been following the discussion closely, but have we heard from any OS developers about what they plan to do if they see the flag?
> 
> I don't need to see code deployed in the wild, but I sure would like to have some hint from implementors what will happen in the wild. Different implementations might well intepret the flag differently, which might result in some surprising behaviors on the wire(less). 
> 
> For instance:
> Devices come up with at least IPv4 enabled and start sending some kind of local multicast, maybe doing service discovery over IPv4. Then a router sends the IPv6-only flag. If some hosts recognize it and others don't, they may try a service that has previously been advertised over IPv4. 
> Does Happy Eyeballs solve this? I don't know whether printer services implement that, though I know that on my dual-stack network I can't print if I lose IPv6. 
> 
> So I'd like to see how OSs will detect and recover.
> 
> Lee
> 
>> On 10/19/2018 08:35 AM, Job Snijders wrote:
>> I think it would be good to have some running code before advancing this to IESG review and RFC publication. I don’t mean someone being able to send the flag in a RA, but an operating system reacting to receiving a RA with the flag set.
>> 
>> Operating system implementers will be able to provide valuable feedback to the working group on how to mitigate risk for some of the suspected attack vectors - and it’ll be educational to see how this works in practice. I think running code will improve this specification.
>> 
>> Kind regards,
>> 
>> Job
>> 
>> 
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------